Malicious node and malicious observer node detection system in MANETs
Summary Mobile ad‐hoc networks (MANETs) are generally organized without infrastructure. Hence, they are moderately defenseless to malicious active and passive attackers that target to damage and trace the data transmission direction. Therefore, the malicious node (MN) (active attacker) and malicious...
Gespeichert in:
Veröffentlicht in: | Concurrency and computation 2021-02, Vol.33 (3), p.n/a, Article 5241 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Summary
Mobile ad‐hoc networks (MANETs) are generally organized without infrastructure. Hence, they are moderately defenseless to malicious active and passive attackers that target to damage and trace the data transmission direction. Therefore, the malicious node (MN) (active attacker) and malicious observer node (MON) (passive attacker) detection system (MODS) is an important challenge in MANETs. It is quite easy to observe a node that induces malicious activities in other nodes, but it is very difficult to identify a node that passively observes and misuses network data. In this work, we propose context‐free grammar (CFG) and Fibonacci‐Pascal triangle (FPT) methods are in MANETs. Here, the MODS used CFG and FPT methods. The CFG is used to isolate the MN, and FPT conceals the real information of the mobile nodes. The data path is protected from mobile MONs by sending a secret message to the destination. The significant application of this scheme is enhancing military security. The simulation results demonstrate that the dynamic estimation of the quality‐of‐service metrics improves the 45% throughput in the network. |
---|---|
ISSN: | 1532-0626 1532-0634 |
DOI: | 10.1002/cpe.5241 |